Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Search Results
Results: 1 through 11 of 11 (0.005 secs)
You searched for: mediatype:movies AND collection:tedtalks AND subject:"Security"
[movies]Bruce Schneier: The security mirage - TED.com
The feeling of security and the reality of security don't always match, says computer-security expert Bruce Schneier. At TEDxPSU, he explains why we spend billions addressing news story risks, like the "security theater" now playing at your local airport, while neglecting more probable risks -- and how we can break this pattern.
Keywords: TEDTalks; TEDxPSU; TED; Talks; culture; global issues; security; technology; 2010
Downloads: 305
[movies]Del Harvey: The strangeness of scale at Twitter - TED.com
When hundreds of thousands of Tweets are fired every second, a one-in-a-million chance -- including unlikely sounding sounding scenarios that could harm users -- happens about 500 times a day. For Del Harvey, who heads Twitter’s Trust and Safety Team, these odds aren’t good. The security maven spends her days thinking about how to prevent worst-case scenarios while giving voice to people around the globe...
Keywords: TedTalks; TED; Talks; security; social media; TED2014; 2014
Downloads: 37
[movies]Lorrie Faith Cranor: What’s wrong with your pa$$w0rd? - TED.com
Lorrie Faith Cranor studied thousands of real passwords to figure out the surprising, very common mistakes that users -- and secured sites -- make to compromise security. And how, you may ask, did she study thousands of real passwords without compromising the security of any users? That's a story in itself. It's secret data worth knowing, especially if your password is 123456 ...
Keywords: TedTalks; TED; Talks; communication; privacy; security; technology; TEDxCMU; 2014
Downloads: 35
[movies]Chris Domas: The 1s and 0s behind cyber warfare - TED.com
Chris Domas is a cybersecurity researcher, operating on what’s become a new front of war, "cyber." In this engaging talk, he shows how researchers use pattern recognition and reverse engineering (and pull a few all-nighters) to understand a chunk of binary code whose purpose and contents they don't know.
Keywords: TedTalks; TED; Talks; security; software; technology; war; TEDxColumbus; 2013
Downloads: 48
[movies]Mikko Hypponen: How the NSA betrayed the world's trust -- time to act - TED.com
Recent events have highlighted, underlined and bolded the fact that the United States is performing blanket surveillance on any foreigner whose data passes through an American entity -- whether they are suspected of wrongdoing or not. This means that, essentially, every international user of the internet is being watched, says Mikko Hypponen. An important rant, wrapped with a plea: to find alternative solutions to using American companies for the world's information nee
Keywords: TEDTalks; TED; Talks; Internet; computers; global issues; security; technology; TEDxBrussels; 2013
Downloads: 64
[movies]Guy-Philippe Goldstein: How cyberattacks threaten real-world peace - TED.com
More and more, nations are waging attacks with cyber weapons -- silent strikes on another country's computer systems that leave behind no trace. (Think of the Stuxnet worm.) At TEDxParis, Guy-Philippe Goldstein shows how cyberattacks can leap between the digital and physical worlds to prompt armed conflict -- and how we might avert this global security hazard.
Keywords: TEDTalks; TEDxParis 2010; TED; Talks; computers; global issues; politics; security; technology; war; 2010
Downloads: 244
[movies]Todd Humphreys: How to fool a GPS - TED.com
Todd Humphreys forecasts the near-future of geolocation when millimeter-accurate GPS "dots" will enable you to find pin-point locations, index-search your physical possessions ... or to track people without their knowledge. And the response to the sinister side of this technology may have unintended consequences of its own. (Filmed at TEDxAustin.)
Keywords: TEDTalks; TED; Talks; TEDxFeatured; global issues; hack; security; technology; tedx; TEDxAustin; 2012
Downloads: 349
[movies]Avi Rubin: All your devices can be hacked - TED.com
Could someone hack your pacemaker? At TEDxMidAtlantic, Avi Rubin explains how hackers are compromising cars, smartphones and medical devices, and warns us about the dangers of an increasingly hack-able world.
Keywords: TEDTalks; TED; Talks; Internet; TEDxFeatured; computers; hack; security; technology; TEDxMidAtlantic; 2011
Downloads: 183
[movies]Juan Enriquez: Your online life, permanent as a tattoo - TED.com
What if Andy Warhol had it wrong, and instead of being famous for 15 minutes, we’re only anonymous for that long? In this short talk, Juan Enriquez looks at the surprisingly permanent effects of digital sharing on our personal privacy. He shares insight from the ancient Greeks to help us deal with our new “digital tattoos.”
Keywords: TEDTalks; TED; Talks; culture; security; social media; technology; TED2013; 2013
Downloads: 171
[movies]Hasan Elahi: FBI, here I am! - TED.com
After he ended up on a watch list by accident, Hasan Elahi was advised by his local FBI agents to let them know when he was traveling. He did that and more ... much more.
Keywords: TEDTalks; TEDGlobal 2011; TED; Talks; art; arts; data; security; war; web; 2011
Downloads: 132
[movies]Marc Goodman: A vision of crimes in the future - TED.com
The world is becoming increasingly open, and that has implications both bright and dangerous. Marc Goodman paints a portrait of a grave future, in which technology's rapid development could allow crime to take a turn for the worse.
Keywords: TEDTalks; TED; Talks; Internet; biology; crime; future; global issues; law; open-source; security; technology; violence; TEDGlobal 2012; 2012
Downloads: 411
Advanced search

Group results by:

> Relevance

Related creators


Related mediatypes